HP3000-L Archives

January 1998, Week 3

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Chris Hill <[log in to unmask]>
Reply To:
Chris Hill <[log in to unmask]>
Date:
Wed, 21 Jan 1998 08:12:34 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (28 lines)
Jim Wowchuk wrote:

> Can someone advise what the status is of this problem?  VT logons used
> to
> send the password across the network in clear text, not encrypted.  Is
> that
> still the case, and if not what release/patch remedied it?  If not the
> case,
> is anyone doing something about this to eliminate it?
>
> Once upon a time, network sniffers were specialised pieces of hardware
> --
> now its a simple piece of PC software.
>
> Thanks a packet,
>
> Jim "lost my .sig" Wowchuk

   Jim,

Yes NS/VT passwords are still in the clear and not encrypted.  You may
wish to look at using virtual tunnels by installing a firewall in front
of the HP, this prevents the sniffers from seeing the traffic, but
requires client software such as Eagle Raptor's product.

Chris Hill
VBISD

ATOM RSS1 RSS2